Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

Assignment 1: Network Access Control

In a business environment, controlling who has access to business information and at what level is critical for facilitating day-to-day business operations. The emphasis of Network Access Control (NAC) it to decide who or what has authorized permission to access resources on the network. In a new age of risks, it is important to re-identify access controls.

Scenario: You have been hired as an IT Security Specialist for a company called LOTR Experience. The leadership at LOTR has recently expressed concerns over various possible security issues. They would like you to be "a new set of eyes" and lead the efforts to review their current security protocols. As an expert in this field, your first task involves assessing NAC and providing a high-level assessment to leadership.

Review the following documents: LOTR Organization Chart, LOTR Network Design, and LOTR AD Design.

Write a technical assessment in which you:

1. Analyze NAC Best Practices and how these can be detrimental to LOTR, outlining goals for the following areas:

1. Endpoint Security

2. Direct Login

3. Remote Access

2. Determine what type of mechanisms will be used to enforce and monitor NAC controls and the frequency with which these should be implemented.

After assessing the LOTR Network Design, outline five (5) potential issues related to NAC that you see in the network's overall design (high-level overview).

1. Describe any operational risks that could affect business processes.

2. Describe the consequences of a threat or vulnerability to the infrastructure.

3. Recommend network changes that will implement the proper NAC controls.

3. Use at least three quality resources in this assignment. Note: Wikipedia and similar websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

• Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA format.

The specific course learning outcomes associated with this assignment are:

• Examine methods that mitigate risk to an IT infrastructure with confidentiality, integrity, availability, and access controls.

• Determine appropriate access controls for information systems within IT infrastructures.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M93137333
  • Price:- $60

Priced at Now at $60, Verified Solution

Have any Question?


Related Questions in Computer Engineering

Wat type of malware do you think is the most destructive

What type of malware do you think is the most destructive : viruses, worms, trojan programs, spyware or adware.

Question rns versus gsd representation we are contemplating

Question : RNS versus GSD representation We are contemplating the use of 16-bit representations for fast integer arithmetic. One option, radix-8 GSD representation with the digit set [-5,4], can accommodate four-digit nu ...

Pablo bought some rural property in oconee county that is

Pablo bought some rural property in Oconee County that is rumored to be part of an expansion of the Epps Bridge Center phenomenon. The developer of the party told him that the property could triple in value under the exp ...

Lab assessment questions 1 what is the one thing that a

Lab Assessment Questions: 1. What is the one thing that a virus, a worm, spyware, and malicious code have in common? What are the differences among these three threats: a virus, a worm, and spyware? 2. How often should y ...

What is the formula used to calculate marginal product of

What is the formula used to calculate marginal product of food and manufactures.

Question how can the security vulnerabilities common with

Question : How can the security vulnerabilities common with wireless networking be handled to mitigate the risks? The response must be typed, single spaced, must be in times new roman font (size 12) and must follow the A ...

Scenario pit powerpit owns a small bike shop feelwheel that

SCENARIO: PIT POWER Pit owns a small bike shop FeelWheel that sells only customized bikes. These days, many customers inherit their bikes from their grandparents or buy them in hardware stores. Thus, it does not make muc ...

After reading this weeks materials please respond to two 2

After reading this week's materials, please respond to TWO (2) of the following questions. PROVIDE CITATION IN APA 1. Describe the controls contained within the three Access Control categories that can be integrated with ...

Question as we have seen traditional and agile schedule

Question : As we have seen, traditional and Agile schedule developments are quite different. Agile project management was originally developed to do software development. Could a traditional process be successfully used ...

What are some examples of when a data compression utility

What are some examples of when a data compression utility can be used for information stored on a computer's hard drive?

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As